Title :
Adding availability to log services of untrusted machines
Author :
Arona, A. ; Bruschi, D. ; Rosti, E.
Author_Institution :
Dipt. di Sci. dell´´Inf., Milan Univ., Italy
Abstract :
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering with information can be achieved using cryptographic functions that provide authenticity, integrity, and confidentiality. However, they cannot provide the prerequisite for any further information processing, i.e., information availability. In this case, fault tolerant strategies can be of great help improving information availability in case of accidental or deliberate deletion. In this paper we propose a system that increases log file availability in case of software deletion by reliably and efficiently distributing the logs on multiple independent machines. The proposed scheme is more efficient than simple replication, both from the storage space and the network bandwidth points of view. The proposed system has been implemented and its impact on performance has been measured. Since it operates as a postprocessor after log generation, the proposed system can be easily integrated with logging systems that provide various cryptographic functions for forensic purposes
Keywords :
auditing; security of data; software fault tolerance; system monitoring; accidental deletion; computer forensics; cryptographic functions; deliberate deletion; fault tolerant strategies; information availability; intrusion; log distribution; log file availability; log generation; log services; multiple independent machines; network bandwidth; performance; postprocessor; protection; real time system auditing; real time system monitoring; software deletion; storage space; uncorrupted log files; untrusted machines; Availability; Bandwidth; Computerized monitoring; Cryptography; Data security; File systems; Information processing; Information security; Protection; Read only memory;
Conference_Titel :
Computer Security Applications Conference, 1999. (ACSAC '99) Proceedings. 15th Annual
Conference_Location :
Phoenix, AZ
Print_ISBN :
0-7695-0346-2
DOI :
10.1109/CSAC.1999.816028